Speaker: Dr. Rajesh P. Deo, Senior Manager @Ernst&Young
*We suggest you use Chrome to view the slides, as the it may be inaccessible on other browsers like safari etc.
Please Note - Speaker presentations represent the views of the individual s
Speaker: Dr. Rajesh P. Deo, Senior Manager @Ernst&Young
*We suggest you use Chrome to view the slides, as the it may be inaccessible on other browsers like safari etc.
Please Note - Speaker presentations represent the views of the individual s
Speaker:Arnab Chattopadhyay, Senior Technical Director @MetricStream
*We suggest you use Chrome to view the slides, as the it may be inaccessible on other browsers like safari etc.
Please Note - Speaker presentations represent the views of the
Speaker: Ravi Mishra, Head Of Advisory @CISO Platform
Please Note - Speaker presentations represent the views of the individual speakers and not of CISO Platform or their employers
Speaker: Bikash Barai, Co-Founder Cigital India ( Earlier iViZ )
Please Note - Speaker presentations represent the views of the individual speakers and not of CISO Platform or their employers
Speaker: Vinayak Godse, Senior Director-Data Protection @DSCI
Please Note - Speaker presentations represent the views of the individual speakers and not of CISO Platform or their employers
Speaker: Nilanjan De, Principal Architect @Cigital
Ransomware is a type of malicious software (malware) when infected with encrypts all the important files such as documents, pictures, movie file etc with a virtually unbreakable encryption key. Here we have compiled some of the Good-reads blogs, ar
Turbo Talks
How the Heartbleed bug was found?
Antti Karjalainen discoverer of Heartbleed
The Heartbleed bug was a catastrophic vulnerability in widely used OpenSSL TLS implementation. This talk will give background how the Heartbleed bug was found
We believe, isn't a single technology/solution but is a complex program which consists of people, process and technology. Sandboxing or any single technology can only provide partial protection against “real” advanced attacks. We suggest organizat
The quantity of vulnerabilities are exploding in today’s dynamic environments, while attackers are exploiting them faster than ever before—and with greater sophistication and stealth. In so- called “zero-day attacks,” exploits are created for vulnera
An average CISO Tenure is 17 months. This is why we brought up the burnout issue. Some of the factor are listed below:
CISO Role Expectations-
The world today is full of unlimited business opportunities. We all operate in digital era to perform business operations (by Connecting people, enterprises, Smart Cities, systems, LOT, Utilities, Smart Grids/Meters, Big Data and Analytics and SMAC a
According to a recent research sited in the whitepaper, 86% security leaders have adopted or plan to adopt cloud initiatives. Cloud being cost-effective, investments in public, private and hybrid clouds are reasonable investments. This guide will giv
Our editorial team has handpicked the best of the best talks at RSA Conference - one of the largest IT Security Conference in the world. Following is the list of top talks on Incident Response & SIEM at RSA Conference 2016.
RSA Conference held its 2
In keeping with the latest happenings in Information security, this article is on the 10 finalists of RSA innovation sandbox contest held at the RSA Security conference, the world's leading Information security conference. Companies with innovative
SAP has released the monthly critical patch update for April 2016. This patch update closes 26 vulnerabilities in SAP products including 19 SAP Security Patch Day Notes and 7 Support Package Notes. 8 of all Notes were released after the second Tuesda
Our editorial team has handpicked the best of the best talks at RSA Conference - one of the largest IT Security Conference in the world. Following is the list of top talks IAM,Artificial Intelligence,datasecurity,crypto & Others at RSA Conference 20
Our editorial team has handpicked the best of the best talks at RSA Conference - one of the largest IT Security Conference in the world. Following is the list of top SoftwareApplication Security & DevOps talks at RSA Conference 2016.
RSA Conference
Our editorial team has handpicked the best of the best talks at RSA Conference - one of the largest IT Security Conference in the world. Following is the list of top Emerging Areas In Security Technology talks at RSA Conference 2016.
RSA Conference
Our editorial team has handpicked the best of the best talks at RSA Conference - one of the largest IT Security Conference in the world. Following is the list of top CISO talks at RSA Conference 2016.
RSA Conference held its 25th annual event at the